Signup
Step 1 of 3
RigNet Internet Protocol Network
License Agreement
The RigNet Internet Protocol Network ("Network") is a service made available for non-business use by employees during off-duty hours while assigned aboarda asset. An employee's use of this service is subject to the RigNet Acceptable Use Policy ('RigNetPolicy') set forth below, Company Code of Business Conduct and Ethics, and established policy. Improper use in violation of the code and/or policy may subject the user to discipline which may be up to and include termination of employment.
The following RigNet Policy specifies the actions prohibited by the service provider,RigNet Inc. ("RigNet"), to users of the Network. RigNet reserves the right to modify the RigNetPolicy at any time, effective when distributing the modified RigNetPolicy to its users.
Illegal use
The Network may be used only for lawful purposes which includes applicable local laws. Transmission, distribution, reproduction or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, confidential business information, and material that is obscene, defamatory, constitutes an illegal threat or harassment, or violates export control laws. Unlawful use may subject the user to criminal and civil liability as well as discipline up to and including termination of employment. RigNet fully supports US and international copyright law and requires all any person using the Network to respect the copyright protected materials of others. Copyright law may impose civil and/or criminal liabilities on the individual infringer as well as on the infringer’s employer. Using the Network to download copyrighted material is strictly prohibited.
System and network security
Violations of or attempts to breach system or network security are prohibited, and may result in criminal and civil liability.RigNet will investigate incidents involving such violations and may involve and will cooperate with company and law enforcement if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following:
- Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network.
- Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network.
- Interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks.
- Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting.
Email
Sending unsolicited mail messages, including, without limitation, commercial advertising is explicitly prohibited. A user shall not use the mail server of another site to relay mail without the express permission of the site.
Usenet
Posting the same or similar message to one or more newsgroups (excessive cross-posting or multiple-posting, also known as "SPAM") is explicitly prohibited.
A REPEAT OR REPEATED INDIRECT OR ATTEMPTED VIOLATIONS OF THE POLICY, AND A REPEAT OR REPEATED ACTUAL OR ATTEMPTED VIOLATIONS BY A THIRD PARTY ON BEHALF OF USEROR THE END USER, SHALL BE CONSIDERED VIOLATIONS OF THE POLICY BY USER IF USERHAS RECEIVED PRIOR NOTICE FROM RIGNET OF A PRIOR VIOLATION OF THE SAME OR SIMILAR NATURE.
Content Filtering
Internet access to certain websites has been blocked using content filtering software. The site data used for filtering is provided by St. Bernard's iGuard.iGuard is a 100% human-reviewed URL database from St. Bernard Software.iGuard analysts works around the clock reviewing URLs to ensure that every update includes the latest sites, in the following categories.
- Lingerie/bikini: Sites displaying or dedicated to lingerie/bikini that could be considered adult-only.
- Nudity: Sites that provide images or representations of nudity.
- Pornography: Anything relating to pornography, including mild depiction, soft pornography or hard-core pornography.
- Sexuality: Sites that provide information, images or implications of bondage, sadism, masochism, fetish, beating, body piercing or self-mutilation.
- Tasteless: Sites that contain information on such subjects as mutilation, torture, horror or the grotesque.
- Proxy/anonymizer: Sites providing proxy bypass information or services. Also, sites that allow the user to surf the net anonymously, including sites that allow the user to send anonymous emails.
Violations of RigNet Policy will be reported to the appropriate company personnel and RigNetmay involve and will cooperate with company and law enforcement if unlawful activity is suspected. Availability of the Network may also be terminated for any individual or removed from any company for improper use as defined herein.
Complaints regarding unethical or illegal use or system or network security issues should be sent to support@rig.net.
Complaints regarding email, Usenet and SPAM abuse should be sent to support@rig.net.
For live assistance, please contact RigNet at +1 888 9 RIGNET.
|
 |